Data processing: software development – installation – and managem – Software program development tool – Testing or debugging
Reexamination Certificate
2004-05-28
2010-10-26
Bullock, Jr., Lewis A (Department: 2193)
Data processing: software development, installation, and managem
Software program development tool
Testing or debugging
C717S124000, C717S130000, C717S131000, C714S038110
Reexamination Certificate
active
07823134
ABSTRACT:
A computer method for issuing an early warning includes determining, using change and test coverage and control flow and data flow analyses of a program, locations in the program at which to insert early warning (EW) code to monitor for an event. The program is instrumented with EW code which monitors for the event, by inserting EW code at the determined locations. Upon detecting the event, EW code performs an early action warning, or issues an early action. Early warnings are issued when an EW-instrumented block is reached. Issuance of an early warning action can be conditional upon execution of the program in a particular environment, such as a production environment. Issuance of an EW can also be conditional upon executing an untested block of code that was recently modified.
REFERENCES:
patent: 3711863 (1973-01-01), Bloom
patent: 4667290 (1987-05-01), Goss et al.
patent: 4819233 (1989-04-01), Delucia et al.
patent: 4951195 (1990-08-01), Fogg, Jr. et al.
patent: 5117352 (1992-05-01), Falek
patent: 5119377 (1992-06-01), Cobb et al.
patent: 5146586 (1992-09-01), Nakano
patent: 5191646 (1993-03-01), Naito et al.
patent: 5241678 (1993-08-01), Futamura et al.
patent: 5265254 (1993-11-01), Blasciak et al.
patent: 5321828 (1994-06-01), Phillips et al.
patent: 5327568 (1994-07-01), Maejima et al.
patent: 5359608 (1994-10-01), Belz et al.
patent: 5428786 (1995-06-01), Sites
patent: 5446878 (1995-08-01), Royal
patent: 5450586 (1995-09-01), Kuzara et al.
patent: 5488714 (1996-01-01), Skidmore
patent: 5507030 (1996-04-01), Sites
patent: 5539907 (1996-07-01), Srivastava et al.
patent: 5546586 (1996-08-01), Wetmore et al.
patent: 5615369 (1997-03-01), Holler
patent: 5675803 (1997-10-01), Preisler et al.
patent: 5732273 (1998-03-01), Srivastava et al.
patent: 5732275 (1998-03-01), Kullick et al.
patent: 5758061 (1998-05-01), Plum
patent: 5764992 (1998-06-01), Kullick et al.
patent: 5790858 (1998-08-01), Vogel
patent: 5802373 (1998-09-01), Yates et al.
patent: 5812855 (1998-09-01), Hiranandani et al.
patent: 5870607 (1999-02-01), Netzer
patent: 5966541 (1999-10-01), Agarwal
patent: 5978588 (1999-11-01), Wallace
patent: 6018747 (2000-01-01), Burns et al.
patent: 6071316 (2000-06-01), Goosen et al.
patent: 6085244 (2000-07-01), Wookey
patent: 6106571 (2000-08-01), Maxwell
patent: 6138270 (2000-10-01), Hsu
patent: 6202199 (2001-03-01), Wygodny et al.
patent: 6216237 (2001-04-01), Klemm et al.
patent: 6282701 (2001-08-01), Wygodny et al.
patent: 6405327 (2002-06-01), Sipple et al.
patent: 6481008 (2002-11-01), Chaiken et al.
patent: 6598223 (2003-07-01), Vrhel et al.
patent: 6895578 (2005-05-01), Kolawa et al.
patent: 0 403 415 (1990-12-01), None
patent: 0 286 361 (1998-10-01), None
patent: 0 372 835 (1998-12-01), None
patent: 90/01738 (1990-02-01), None
patent: 00/11549 (2000-03-01), None
patent: 00 54385 (2000-09-01), None
Leon Stucki and Gary Foshee, “New Assertion Concepts for Self-Metric Software Validation”, 1975, ACM SiGPLAN Notices, vol. 10, Issue 6, pp. 59-71.
Christina Pavlopoulou, “Residual Coverage Monitoring of Java Programs”, Aug. 1997, Master of Science Thesis, Perdue University, retrieved from: http://www.cs.uoregon.edu/research/perpetual/dasada/Papers/Pavlopoulou-MSthesis.pdf.
Puketza et al., “A Methodology for Testing Intrusion Detection Systems,” IEEE Transactions, vol. 22, Issue: 10, pp. 719-729, Oct. 1996.
Puketza et al., “A Software Platform for Testing Intrusion Detection Systems,” IEEE, vol. 14, Issue: 5, pp. 43-51, Oct. 1997.
Robert C. Bedichek, “Some Efficient Architecture Simulation Techniques,” Department of Computer Sciences, University of Washington, Usenix Conference, Jan. 1990.
Robert C. Bedicheck, “Talisman: Fast and Accurate Multicomputer Simulation,” 1985, Laboratory for Computer Science, Massachusetts Institute of Technology.
Colin Hunter, et al., “DOS at RISC,” Byte, Nov. 1989, pp. 361-368.
Anant Agarwal, et al., “ATUM: A New technique for Capturing Address Traces Using Microcode,” Proceedings of the 13thAnnual Symposium on Computer Architecture, Jun. 1986.
Kazuhito, Patch System, Patent Abstract of Japan (CD-ROM), Unexamined Applications, vol. 94, No. 11 (Nov. 8, 1994).
International Business Machines Corporation, Generic Methodology for Code Patching in Binary File, 802-803 (Jun. 1998).
Ammons, G., and Larus, J., “Improving Data-flow Analysis with Path Profiles,” ACM Sigplan Notices, US, Association for Computing Machinery, 33(5): 72-84 (1998).
Ball, T. and Larus, J.R., “Optimally Profiling and Tracing Programs,” Technical Report #1031, Rev. 1, Computer Sciences Department, University of Wisconsin—Madison, Sep. 1991.
“Instruction Trace Apparatus. Feb. 1978,”IBM Technical Disclosure Bulletin, 20(9): 1-3 (Feb. 1, 1978).
Rosen, Kenneth H., et al.,UNIX System V Release 4: An Introduction for New and Experienced Users, pp. 441-442, Osborne McGraw-Hill (1990).
Aho, Alfred V., et al., “Compilers—Principles, Techniques and Tools,” pp. 429-440 and 475-480, Addison-Wesley Publishing Company, (reprinted Mar. 1988).
Ferrante, J., et al., The Program Dependence Graph and Its Use in Optimization, pp. 320-349.
Johnson, R., et al., “Dependence-Based Program Analysis,” pp. 78-89.
Aho, Alfred V., Compilers, Principles, Techniques, and Tools, pp. 513-580.
Ambras, J.P. et al., “Microscope: An Integrated Program Analysis Toolset,”Hewlett-Packard Journal, 4:71-82 (Aug. 1, 1988).
Lucas, C., et al., “Managing Software Evolution Through Reuse Contracts,” Programming Technology Lab, Vrije Universiteit Brussel, IEEE: 165-168 (1997). Retrieved from the IEEE database on Sep. 4, 2002.
Rothermel, G., and Harrold, J.J., “A Safe, Efficient Regression Test Selection Technique,”ACM Transactions on Foftware Engineering and Methodology, 6(2): 173-210 (Apr. 1997) Retrieved from the ACM database on Sep. 4, 2002.
Rothermel, G., and Harrold, M.J., “Selecting Tests and Identifying Test Coverage Requirements for Modified Software,” Department of Computer Science, Clemson University, ACM (1997). Retrieved from the ACM database on Sep. 4, 2002.
Coppieters, K., “A Cross-Platform Binary Diff,”Dr. Dobb's Journal, pp. 32, 35-36 (May 1, 1995).
Feldman, S.I. and Brown, C.B. “IGOR: a system for Program Debugging via Reversible Execution,”Proceedings of the ACM SIGPLAN and SIGOPS Workshop on Parallel and Distributed Debugging, pp. 112-113(1998).
Larus, J.R. “Abstract Execution: A Technique for Efficiently Tracing Programs,” from Software Practice & Experience, GB (Chichester, John Wiley & Sons Ltd.) pp. 1241-1258 (Dec. 1, 1990).
“Productivity Tool for Online Tracing of an Assembly LISTING Using a Per Trace File,”IBM Technical Disclosure Bulletin, (Nov. 1, 1987).
Agarwal Anant
Ayers Andrew E.
Schooler Richard
Bullock, Jr. Lewis A
Meyertons Hood Kivlin Kowert & Goetzel P.C.
Symantec Operating Corporation
Wang Jue
LandOfFree
Early warning mechanism for enhancing enterprise availability does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Early warning mechanism for enhancing enterprise availability, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Early warning mechanism for enhancing enterprise availability will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4162097